Lucene search

K
redhatRedHatRHSA-2023:6939
HistoryNov 14, 2023 - 8:40 a.m.

(RHSA-2023:6939) Moderate: container-tools:rhel8 security and bug fix update

2023-11-1408:40:58
access.redhat.com
69
container-tools
security fix
podman
buildah
skopeo
runc
go-yaml
golang
html/template
net/http
net/textproto
mime/multipart
crypto/tls
golang.org/x/net/html
cve-2022-3064
cve-2023-24540
cve-2022-41723
cve-2022-41724
cve-2022-41725
cve-2023-3978
cve-2023-24534
cve-2023-24536
cve-2023-24537
cve-2023-24538
cve-2023-24539
containerd
runc
cve-2023-25173
cve-2023-25809
cve-2023-27561
cve-2023-28642
cve-2023-29400
cve-2023-29406
cve

6.6 Medium

AI Score

Confidence

High

0.024 Low

EPSS

Percentile

90.0%

The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.

Security Fix(es):

  • go-yaml: Improve heuristics preventing CPU/memory abuse by parsing malicious or large YAML documents (CVE-2022-3064)

  • golang: html/template: improper handling of JavaScript whitespace (CVE-2023-24540)

  • net/http, golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding (CVE-2022-41723)

  • golang: crypto/tls: large handshake records may cause panics (CVE-2022-41724)

  • golang: net/http, mime/multipart: denial of service from excessive resource consumption (CVE-2022-41725)

  • golang.org/x/net/html: Cross site scripting (CVE-2023-3978)

  • golang: net/http, net/textproto: denial of service from excessive memory allocation (CVE-2023-24534)

  • golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption (CVE-2023-24536)

  • golang: go/parser: Infinite loop in parsing (CVE-2023-24537)

  • golang: html/template: backticks not treated as string delimiters (CVE-2023-24538)

  • golang: html/template: improper sanitization of CSS values (CVE-2023-24539)

  • containerd: Supplementary groups are not set up properly (CVE-2023-25173)

  • runc: Rootless runc makes /sys/fs/cgroup writable (CVE-2023-25809)

  • runc: volume mount race condition (regression of CVE-2019-19921) (CVE-2023-27561)

  • runc: AppArmor can be bypassed when /proc inside the container is symlinked with a specific mount configuration (CVE-2023-28642)

  • golang: html/template: improper handling of empty HTML attributes (CVE-2023-29400)

  • golang: net/http: insufficient sanitization of Host header (CVE-2023-29406)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.9 Release Notes linked from the References section.

6.6 Medium

AI Score

Confidence

High

0.024 Low

EPSS

Percentile

90.0%